Skip to content

cyber security graduate

The Supreme Court and Your Smartphone

Suppose you’re pulled over because your left taillight is out, because your license plate tag is a bit out of date, or because one of… Read More »The Supreme Court and Your Smartphone

Two Factor Authentication Is A Must For SMBs

Identity theft is becoming a bigger concern by the day. Latest figures released by Privacy Rights Clearinghouse Chronology of Data Breaches tracking tool claim that… Read More »Two Factor Authentication Is A Must For SMBs

Two Positive Uses For Keyloggers

A keylogger is any type of utility that records the keystrokes made by someone on a computer. For many people, the first things that come… Read More »Two Positive Uses For Keyloggers

What is the Difference Between Malware and a Virus?

Malware, spyware and viruses are used interchangeably when discussing general computer infections. In the last few years, being able to identify for the purpose of… Read More »What is the Difference Between Malware and a Virus?

How Secure Are You Around "IoT"?

“The number of Internet-connected devices is growing rapidly and is expected to reach 50 billion by 2020.” This data is overwhelming and testifies the importance… Read More »How Secure Are You Around "IoT"?

Confidentiality And Data Protection in Cyprus

Confidentiality and data protection are two vital issues in almost all business, social and employment matters. Specifically, data protection is an emerging topic that public… Read More »Confidentiality And Data Protection in Cyprus

Improving Your Day – How to Be Positive

In troubled times as of today, how do you stay positive? You are confined indoors and feel bored to death. How can you improve your… Read More »Improving Your Day – How to Be Positive

Personal Data Protection In Cyprus

Personal data defines any information relating to a natural living person. Some illuminating examples are the number of our identity card, passport, date of birth,… Read More »Personal Data Protection In Cyprus

Key Trends That Will Shape P&C Insurance Markets

Disrupting technologies, increasing competition and economic pressures makes P&C insurance to look beyond traditional strategies. A shift is going on in the P&C insurance sector.… Read More »Key Trends That Will Shape P&C Insurance Markets

Beware of Cybercrimes in Online Enterprises

Cybercrime has caused a tremendous loss both directly and indirectly as far as small and medium enterprises are concerned, be they online or not. Amassing… Read More »Beware of Cybercrimes in Online Enterprises

Criminals With Computers

The phrase ‘cyber warfare’ appears as if it is ubiquitous at present. With the recent shocking Stuxnet attack, and attacks on a range of government… Read More »Criminals With Computers

Cyber Security: Who Is Winning?

The answer to the above question is easy. The bad guys are winning. Cyber crime is expanding both in volume and sophistication. Worse yet, securing… Read More »Cyber Security: Who Is Winning?

NHS Cyber Attack – A Sign of the Times

What Happened? This may seem only relevant if you were affected but you will see, this sort of attack is very common. The NSA lost… Read More »NHS Cyber Attack – A Sign of the Times

Free Cyber security Assessment

Global Cyber Security Centre

CONSULTANCY

Support